Showing results 2481 to 2500 of 6008
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Controllable hand deformation from sparse examples with rich details Proceeding/Conference:Proceedings of the 2011 ACM SIGGRAPH/Eurographics Symposium on Computer Animation, SCA '11 | 2011 | ||
Minimizing the number of separating circles for two sets of points in the plane Proceeding/Conference:Proceedings - 2011 8th International Symposium on Voronoi Diagrams in Science and Engineering, ISVD 2011 | 2011 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
Multi-body segmentation and motion number estimation via over-segmentation detection Proceeding/Conference:Lecture Notes in Computer Science | 2011 | ||
Security on cloud computing, query computation and data mining on encrypted database Proceeding/Conference:IEEE Technology Time Machine Symposium on Technologies Beyond 2020, TTM 2011 | 2011 | ||
DTTM: a discriminative temporal topic model for facial expression recognition Proceeding/Conference:Lecture Notes in Computer Science | 2011 | ||
Adaptive phenotype testing for AND/OR items Proceeding/Conference:Lecture Notes In Computer Science | 2011 | ||
Interactive 2D and volume image segmentation using level sets of probabilities Proceeding/Conference:Special Interest Group on Graphics and Interactive Techniques (SIGGRAPH) Asia Sketches | 2011 | ||
Privacy preserving multiple keyword search for confidential investigation of remote forensics Proceeding/Conference:Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011 | 2011 | ||
Human face tracking system with multiple non-overlapping cameras Proceeding/Conference:Proceedings - 3rd International Conference on Data Mining and Intelligent Information Technology Applications, ICMIA 2011 | 2011 | ||
Minimizing average interference through topology control Proceeding/Conference:Lecture Notes in Computer Science | 2011 | ||
ZoomTree: Unrestricted zoom paths in multiscale visual analysis of relational databases Proceeding/Conference:Communications in Computer and Information Science | 2011 | ||
Avoid illegal encrypted DRM content sharing with non-transferable re-encryption Proceeding/Conference:International Conference on Communication Technology Proceedings | 2011 | ||
Dynamic software birthmark for java based on heap memory analysis Proceeding/Conference:Lecture Notes in Computer Science | 2011 | ||
WAVNet: Wide-Area Network virtualization technique for Virtual Private Cloud Proceeding/Conference:Proceedings of the International Conference on Parallel Processing | 2011 | ||
Probabilistic best-fit multi-dimensional range query in Self-Organizing Cloud Proceeding/Conference:Proceedings of the International Conference on Parallel Processing | 2011 | ||
A linear size index for approximate pattern matching Proceeding/Conference:Journal of Discrete Algorithms | 2011 | ||
Managing uncertain spatio-temporal data Proceeding/Conference:Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data, QUeST 2011 | 2011 | ||
Retrieving and ranking unannotated images through collaboratively mining online search results Proceeding/Conference:Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM 2011 | 2011 | ||
Privacy preserving confidential forensic investigation for shared or remote servers Proceeding/Conference:Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 |